Module G4: Protecting Networks (PE) Flashcards

1
Q

A smart card reader and token are examples of?

A

logical device access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is the most critical layer of the Cisco Three Layer Model?

A

core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAAA will return a _____ bit IPv6 address.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When policies and procedures are put in place by an organization to prevent users access to information, this is called?

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which server will receive an initial DNS query?

A

recursor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control is managed at what layer?

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What helps prevent IP address data being provided to other network devices?

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protects the integrity of computer networks?

A

network protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which server resolves the domain name into the IP address?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which type of port security mode will a syslog message be sent?

A

restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is important with switching traffic at the core level?

A

speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a layer 2 device that is very vulnerable to attacks?

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the #1 cause of security breaches?

A

human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In security levels, which level uses network sniffers or IDS/IPS?

A

network level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For DNS lookup what will return a 32 bit IP address?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Effective network-level security incorporates _________ and intrusion detection and prevention systems.

17
Q

What must be in place at the core level?

A

redundancy

18
Q

Which server returns the requested host?

A

authoritative nameserver

19
Q

What is one of the first things you should change for router security?

20
Q

What is the preferred model for network design?

A

three layer model

21
Q

Ensuring employees only have access to data required for their job is what type of control?

A

Administrative control

22
Q

Which server locates the last portion of an address?

A

TLD Name Server

23
Q

In which type of port security mode will the port be shut down?

24
Q

In security layers at which layer is secure coding put into practice?

A

application layer security

25
What was the most expensive cyber attack to date?
Epsilon
26
Which type of DNS query will return a referral to a DNS server of a lower level if it does not have a match?
iterative
27
Port security happens at what layer?
access
28
In security layers which layer uses encryption and user access?
data layer security
29
How many servers are included in DNS protocol?
4
30
What is a common thing to use to display legal information?
banner login
31
CCTV would be what type of control?
physical control
32
Which type of DNS query will return an error message if it can't find the record?
recursive *slide 31
33
If a host needs access to reach another network, what layer handles that?
Distribution
34
In which type of port security mode will no notification be sent?
Protect *slide 25
35
How many types of DNS queries are there?
3 *slide 31
36
Ensuring accounts are removed after an employee leaves the company is what type of control?
administrative
37
Cyber criminals attack every ________ seconds?
39
38
Two factor authentication is what type of control?
technical
39
What protects digital assets with several layers?
layered security